blank
WJNotes
blank

Follow Us

  • This field is for validation purposes and should be left unchanged.
Please follow & like us :)

Protect Your Cybersecurity

Posted: Ashley Cornner-Patel

Cybercrimes, fraud and identity theft are serious threats and are among the fastest growing crimes in America. According to the Bureau of Justice Statistics report in January 2019, over 26 million people experienced identity theft in 2016. A large majority of those identity theft incidents involved misuse or attempted misuse of credit cards or bank accounts. Constant vigilance is key. This WJ Notes will address the various threats and ways in which you can protect yourself against cybercrimes.

Common Cyber Threats

Email Account Takeover

Occurs when a cybercriminal hacks an email account and reads emails to learn about the victim and their habits so they can pose as the victim to steal money.

Malware

Malicious software created to damage/disable computers and computer systems, steal data, or gain unauthorized access to networks. Malware may be installed on a computer when a user clicks an unsafe link, opens an infected file, or visits a legitimate website that could contain adware.

Phishing

Occurs when cybercriminals pretend to be a trustworthy source in order to acquire sensitive personal information such as usernames, passwords, social security numbers, and credit card details. For example, an email from a seemingly legitimate email address instructs you to click on a link to take action (e.g., “validate your account,” “confirm your identity,” “access your tax refund”).

Social Engineering

Involves manipulating or impersonating others to divulge sensitive, private information, and then demanding financial transactions be executed to avoid consequences. The cybercriminal commits fraud, steals your money, and disappears.

Call Forwarding

Occurs when a cybercriminal takes over your cell phone number and impersonates you or reroutes your calls. A cybercriminal gets the phone company to forward your cell number to their cell phone so they can impersonate you when your bank calls you back for verification before transferring funds or opening accounts.

Spoofing

Occurs when a fake email header that gives the impression the email is from someone or somewhere other than the actual source, with the goal of tricking the recipient into opening and responding to the email.

Protecting Your Data

You can defend against most cyber attacks by remaining vigilant and being proactive. Install the most up-to-date antivirus and anti-spyware software on all devices. Hover over website links sent to you via email to ensure they are legitimate links before clicking on them. Be aware that secure websites start with https, not http. Be cautious about the information you choose to share on social media, keeping your personal information private (e.g., home address, phone number, employer, vacation dates, birth date). Be selective about who you allow to join your social networks. Check your monthly phone bill for any suspicious activity. This may include phone numbers you don’t recognize, or calls placed at odd times (e.g., during works hours, while overseas or on vacation).

Finally, safeguard your passwords and use a unique password for each account to prevent a quick and invasive attack on all of your accounts. Make each password unique and long and strong. Use 8-12 characters, upper- and lowercase letters, and symbols. Most importantly, treat your passwords like your underwear, change them often and don’t share them with anybody.

Our Responsibility To You

Our Responsibility to You At WJ Interests, we take the responsibility of cybersecurity and protecting your information very seriously. We not only train our staff on how to protect against cybercrimes, but also ensure that the third-party vendors and custodians we use share that same level of accountability and responsibility in safeguarding your information. We ensure our software is up-to-date and integrate multiple layers of authentication, controls and protection where needed throughout the different types of software that we use. Additionally, personal information is only shared among the staff on a need-to-know basis.

Anytime we receive an email from a client directing that funds be sent to another institution or account that we do not recognize or have a signed letter of authorization on file, we will call you to verbally confirm the instructions. Typically, we also will send you a form to sign physically or electronically depending on the transaction.

Schwab also requires either signed authorization or verbal confirmation depending on the type of transfer. Fortunately, Schwab has made it easier to transfer funds while still protecting your information by giving you access to do it yourself online or giving you the ability to approve it electronically through your own login when we initiate it for you. Schwab also gives you the ability to enable two-factor authentication which would be recommended for any financial account that you may have.

Finally, for physical files, we still offer document shredding for any clients that need it. Just give us a call to schedule a time to come by with any documentation that needs to be shredded.

Back to List